Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

FORUM DISCUSSION

Name : Sri Neha A/P Paramsothy

Matric Number : MC220918401

Course Code : BADB1023

Course Name : Management Information System

Section : MC-013

Lecture : Rashdeen Bin Rashidi


gh t ab out by
t hic a l iss ue s brou
e a n ce m ent in
n ts and a d v
de ve lo p m e
at ion te ch nology
01 inform 03
Privacy issues in IT
Accountability and
Control
This happens when people provide personal details in
internet sites
Control processes must exist in an organization so that accountability
Today's business models depend on getting users to give
information can be interpreted.
up their personal information so it can be used to market
This issue arises if the firm or any individual within the firm fails to
and sell them products
protect and control equipment, key materials and information of the
Personally identifiable information (PII) includes
consumers.
individuals’ names, addresses, phone numbers, bank and
credit accounts, age & other personal details
Anonymous information includes preference data,
04
transaction data, clickstream data, and browser type
Thus, users must back themselves up with technology System Quality
solutions that can protect them from privacy violations
exp: spyware blockers, cookie managers & secure e-mail Data quality and system errors are things to be measured in information
system
Three principal sources of poor system performance are software bugs &
02 errors, hardware or facility failures, poor input data quality
Poor quality data lead to inaccurate analysis, poor customer relations and
Property issues in IT poor business decisions.
Companies need to ensure software quality through software metrics,
The potential for violation of property rights and misuse of identity is very which give objective assessments of system in the form of quantified
high with the use of technologies 05 measurements
Property rights are the claim to our property that belongs to us and the Beyond system quality, companies must also ensure system availability,
right to stop others from claiming the same thing. especially since online transaction processing requires 100% availability,
Fake technology now allows sophisticated manipulation of digital imagery Quality of Life
with no downtime
that people appear to be saying and doing things that never happened.
Also, scammers’ use other people’s identities in scamming others There are many negative social consequences of computerized systems such
Three main types of protection for intellectual property are copyright, as dependence & vulnerability, computer crime & abuse, health risks & etc
patent & trademark law which damage quality of our life
VIRUSES
01 Rogue software program that
RANSOMWARE 04
alter the way a computer A malware that locks the user
operates without the permission out of their files or their device
or knowledge of the user. Virus
replicates and executes itself,
usually doing damage to our
Threats and extort them to pay for a key
to unlock these files for

towards
recovery.
computer in the process.

computerized
information
02 SPYWARE
systems IDENTITY THEFT 05
Malicious software that enters a
Theft of obtaining personal
computer to monitor user's online
information such as social
activities and serve up
security ID, driver’s license and
advertising. Spyware collects
credit card numbers to
personal and sensitive
impersonate someone else.
information and attackers use it
to track, steal, and sell user data.

03 HACKERS &
COMPUTER CRIME
PHISHING
06
Setting up fake Websites or
sending e-mail messages that
People create computer security
look like legitimate businesses to
threats and malware. Their
ask users for confidential
activities include system intrusion,
financial and personal
system damage, cybervandals,
information.
and destruction of Website.
WORMS
07 Independent programs that
EVIL TWINS 10
spreads copies of itself from Is a fake Wi-Fi access point.
computer to computer over a When users connect to this
network. Worms spread by
downloads, e-mail, IM
attachments, and downloads on
Threats access point, all the data they
share with the network passes

towards
through a server controlled by
Websites and social networks. the hacker.

computerized
information
08 TROJAN HORSES
Malware that downloads onto a systems PHARMING 11
computer as a legitimate Slightly similar to phishing but
program. Once downloaded, the pharming redirects users to an
malicious code will execute the attacker-controlled Website,
task the attacker designed it for, even when the individual types
such as spy on users’ or steal the correct Website address.
sensitive data.

09 SPOOFING CLICK FRAUD


12
Misrepresenting oneself by using Occurs when a computer
fake e-mail addresses or program or bot fraudulently clicks
masquerading as someone else. on an online ad without any
intention of making a purchase.
Anti-virus
Firewalls
software

Protective
Authentication
measures to Proxy Servers
Procedures
counter threats

Access Automated
Controls Software
Updates

You might also like